CVE-2017-6349

Published: 27 February 2017

An integer overflow at a u_read_undo memory allocation site would occur for vim before patch 8.0.0377, if it does not properly validate values for tree length when reading a corrupted undo file, which may lead to resultant buffer overflows.

Priority

Negligible

CVSS 3 base score: 9.8

Status

Package Release Status
vim
Launchpad, Ubuntu, Debian
Upstream
Released (2:8.0.0197-3)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(2:8.0.1144-1ubuntu1)
Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable
(2:8.0.1144-1ubuntu1)
Ubuntu 16.04 LTS (Xenial Xerus)
Released (2:7.4.1689-3ubuntu1.4)
Ubuntu 14.04 ESM (Trusty Tahr)
Released (2:7.4.052-1ubuntu3.1+esm1)
Ubuntu 12.04 ESM (Precise Pangolin)
Released (2:7.3.429-2ubuntu2.3)
Patches:
Upstream: https://github.com/vim/vim/commit/3eb1637b1bba19519885dd6d377bd5596e91d22c